CrawlJobs Logo

SOC Analyst Senior Cyber Security Engineer

https://www.soprasteria.com Logo

Sopra Steria

Location Icon

Location:
India , Noida

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Job Description: Minimum 2-year experience working in security operations environment or 2 years’ experience in IT operations Data Centre, SOC/NOC. Ensure all threats at customer environment are detected and notified in timely manner. Continuous review of Incidents to ensure compliance with standard operating procedures. Provide training and feedback to Security Analysts to ensure quality deliverables. Identify and execute continuous improvements in monitoring, including threat scenarios and operating procedures. Interact with customers on queries and improvements related to service deliverables. Should know and able to contribute to MSSP services (Managed Security Services Provider). Perform root cause analysis for any errors /deficiencies pointed out in the monitoring service. Review the alert to determine relevancy and urgency, create new trouble tickets for incident. Ensure thorough knowledge of Protection of Personal Identifiable Information and GDPR. Certification (Must): SC:200 / SC:900; CC2 - Certified in CyberSecurity. Support Hours CET to be followed. Total Experience Expected: 02-04 years. Qualification & Certifications: Engineering graduate - preferably B.E. /B.Tech in IT or Computer Engineering. At least one Certification Preferred - CC2 - Certification in CyberSecurity; SC-900: Microsoft Security, Compliance, and Identity Fundamentals certified; SC-200: Microsoft Security Operations Analyst. Additional Information: ready for 24x7 support services.

Job Responsibility:

  • Ensure all threats at customer environment are detected and notified in timely manner
  • Continuous review of Incidents to ensure compliance with standard operating procedures
  • Provide training and feedback to Security Analysts to ensure quality deliverables
  • Identify and execute continuous improvements in monitoring, including threat scenarios and operating procedures
  • Interact with customers on queries and improvements related to service deliverables
  • Perform root cause analysis for any errors /deficiencies pointed out in the monitoring service
  • Review the alert to determine relevancy and urgency, create new trouble tickets for incident

Requirements:

  • Minimum 2-year experience working in security operations environment or 2 years’ experience in IT operations Data Centre, SOC/NOC
  • Should know and able to contribute to MSSP services (Managed Security Services Provider)
  • Ensure thorough knowledge of Protection of Personal Identifiable Information and GDPR
  • Certification (Must): SC:200 / SC:900
  • CC2 - Certified in CyberSecurity
  • Engineering graduate - preferably B.E. /B.Tech in IT or Computer Engineering
  • At least one Certification Preferred - CC2 - Certification in CyberSecurity
  • SC-900: Microsoft Security, Compliance, and Identity Fundamentals certified
  • SC-200: Microsoft Security Operations Analyst
  • ready for 24x7 support services

Additional Information:

Job Posted:
January 22, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for SOC Analyst Senior Cyber Security Engineer

Senior Detection Engineer

This is a detection engineering role that leverages knowledge of monitoring, ana...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
https://www.marriott.com Logo
Marriott Bonvoy
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of collective experience in Splunk SIEM (Splunk Enterprise Security) threat detection use case development or UEBA (Exabeam) use case development for insider threat use case development
  • 5+ years of experience in security functions such as SOC, CIRT, security engineering, risk management, vulnerability management or technical infrastructure operations, administration, or systems engineering
  • scripting or programming language, including Python
  • Current information security certification such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) preferred
  • offensive and defensive security certifications such as CEH, IGAC Cyber Defense, OSCP or other related certifications preferred
  • Splunk Certification, including Splunk Enterprise Security Certified Admin preferred
  • use case development experience on the Exabeam platform preferred
  • working knowledge of the NIST Cyber Security Framework and ISO/IEC 27001:2022 preferred
  • working knowledge of the MITRE ATT&CK Framework preferred
Job Responsibility
Job Responsibility
  • Lead collaboration sessions within the cyber security tower and other business units to devise security monitoring use cases
  • engage and collaborate with other security engineers and architects as needed to keep pace with the evolution of corporate infrastructure and applications and share that knowledge with peers as appropriate
  • document prospective security monitoring use cases with MITRE ATT&ACK mappings using standard templates and methodologies
  • inform and consult other cyber ops teams of required data onboarding and integrations for use case development
  • develop analytics, correlation searches, dashboards, reports and alerts within the SIEM and UEBA platforms
  • solicit feedback for pre-production security monitoring content through peer review process and user acceptance testing for tuning
  • document developed security monitoring content in a documentation registry using department standard templates and methodologies
  • manage field mapping and transmission of security monitoring alerts to the security incident response platform for SOC analyst consumption as outlined in process documentation
  • provide governance support for the content development function entailing content development standards compliance, change management approvals for SIEM or UEBA content, and lifecycle management of developed security monitoring content
  • service operational requests in queue such as analytics content performance tuning, filtering, search refinement, parsing issues
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Incident Response Analyst

You will work as a Senior Cybersecurity Incident Response Analyst as part of Hew...
Location
Location
Ireland , Galway
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • typically 4+ years of relevant experience
  • SOC team/Incident response analyst experience is required
  • proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • advanced understanding of adversary tactics, techniques, and procedures (TTPs)
  • advanced Cyber and IT security knowledge
  • advanced understanding of Cyber and IT security risks, best practices, threats and prevention measures as well as containment and remediation actions
  • advanced understanding of SQL and relevant scripting languages
  • advanced data security system analysis skills
  • advanced risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most complex cybersecurity incidents, guiding cross-functional teams through containment, eradication, and recovery
  • analyze associated logs and respond to high severity incidents
  • suggest automation opportunities to enhance IR
  • mentor and provide technical guidance to less experienced cybersecurity professionals
  • stay at the forefront of cybersecurity trends, threats, and technologies
  • foster a culture of continuous improvement and innovation
  • encourage the adoption of new technologies and methodologies
  • provide insight and guidance through after action reviews working with stakeholders.
What we offer
What we offer
  • Comprehensive suite of benefits supporting physical, financial and emotional wellbeing
  • programs for professional and personal career development
  • unconditional inclusion and flexibility to manage work and personal needs.
  • Fulltime
Read More
Arrow Right

Senior Consultant - Proactive Services

As a Senior Consultant in Unit 42 you will have the opportunity to work across a...
Location
Location
Singapore , Singapore
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of consulting experience in SOC, security engineering, SIEM administration, and incident management
  • Demonstrated success with serving large, multinational organisations in designing and implementing an organisation’s security operations program
  • Possess a deep technical knowledge in Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response/Next Gen Protection and Response (EDR/XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms
  • Experience in security operations design, engineering and/or analysis and investigations, ideally in complex environments
  • Ability to perform detailed assessments, identify areas for improvement and make recommendations to transform an organisation's cyber security operations
  • Demonstrated experience in improving an organisations security operations capabilities
  • Experience in conducting threat hunting and/or compromise assessments
  • Relevant industry certifications including GIAC Defensible Security Architect (GDSA), GIAC Intrusion Analyst (GCIA), GIAC Continuous Monitoring (GMON), CISSP
  • Understanding of cyber risk frameworks or industry standards such as 800-53, ISO 27001/2, PCI, CIS 18, CMMC
  • 3+ years of experience performing cloud security advisement and risk assessments
Job Responsibility
Job Responsibility
  • Work across a number of proactive cyber security domains including Cloud Security, Security Operations, Cyber Risk Management and Artificial Intelligence in cyber security
  • Deliver the best consulting outcomes for clients, as they work to address the challenges associated with today’s cyber threat landscape
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are seeking a Senior SOC Analyst to lead advanced security monitoring, incide...
Location
Location
South Africa , South Africa
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cybersecurity, Information Technology, or a related field
  • 3–5 years of experience in SOC operations, incident response, or advanced security monitoring roles
  • One or more of the following advanced certifications: GIAC GCFA (Forensic Analyst) or GNFA (Network Forensics Analyst) GIAC GCTI (Cyber Threat Intelligence) GIAC GSOC (Security Operations Certified) CREST Registered Intrusion Analyst (CRIA) Advanced tool/vendor certifications (e.g., Splunk Enterprise Security Admin, Elastic Security Specialist)
  • Strong expertise in digital forensics, incident handling, and threat intelligence
  • Advanced knowledge of MITRE ATT&CK and threat actor TTPs
  • Proficiency in SIEM query languages (SPL, KQL, Lucene)
  • Experience working in 24×7 enterprise or MSSP SOC environments
  • Strong reporting, documentation, and stakeholder communication skills
Job Responsibility
Job Responsibility
  • Lead advanced incident response activities, including containment, eradication, and recovery
  • Perform digital and network forensic investigations to support incident analysis
  • Conduct proactive threat hunting and advanced detection engineering
  • Analyze threat intelligence and correlate with internal security events
  • Design, tune, and optimize SIEM and SOAR use cases and detection rules
  • Serve as an escalation point for complex security incidents
  • Provide mentorship and technical leadership to junior and intermediate SOC analysts
  • Develop SOC playbooks, procedures, and post-incident reports
  • Collaborate with security architecture and risk teams to improve security posture
What we offer
What we offer
  • Higher responsibility than junior role
  • Career growth opportunity
  • Strong job security
  • Fulltime
Read More
Arrow Right

SecOps Engineer

The SecOps Engineer manages and leads the resolution of high or critical severit...
Location
Location
United States , Milwaukee; Boston; Paramus
Salary
Salary:
135000.00 - 150000.00 USD / Year
veolianorthamerica.com Logo
Veolia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s or Master’s Degree in Computer Science, Engineering, Information Security or extensive professional experience considered in place of a Bachelor’s degree
  • Min of 5 years of professional experience in SOC operations and/or incident response
  • Understanding of technologies and solutions utilized in cybersecurity and networks (SIEM, SOAR, Firewalls, IAM, IDS/IPS, End Point Protection, Threat Management/Intelligence)
  • Expertise in Cloud security such as AWS, GuardDuty, CloudTrail, Lambda, GCP, GCP Cloud Audit, Cloud Security Command Center, Log Explorer, GKE Logs, Kubernetes
  • Understanding of API security: REST, SOAP, OAuth, API Keys/Tokens, API Gateway
  • SaaS: SSPM, CASB
  • Familiarity with security frameworks, standards, and guidelines
  • Knowledge of current hacking techniques, vulnerability disclosures, data breach incidents, and security analysis techniques
  • Ability to work with complex problems where analysis of situations or data requires an in-depth evaluation of variable factors
  • Excellent troubleshooting and problem-solving skills
Job Responsibility
Job Responsibility
  • Work closely with and advise on security best practices for Cloud, Infrastructure, Developers and Data Analysts to ensure security is implemented by design
  • Design and implement technical security controls
  • Conduct security review/audit of Cloud, SaaS, Network, AI environments to identify and mitigate potential security risks
  • Develop and implement security automation workflows using scripting languages and/or automation tooling such as Torq, Tines, etc
  • Provide seniority and oversight for a SOC shift as needed
  • Conduct complex investigations and providing advice to other Security Analysts
  • Manage and lead High or Critical severity incident resolution
  • Develop customized scripts or procedures to automate the repetitive tasks and improve the efficiency of incident response activities
  • Provide expert advice on remediation and recovery efforts and develop threat remediation strategies
  • Perform proactive analysis of the attack surface and advising on potential threats and attack vectors
What we offer
What we offer
  • Paid time off policies
  • health, dental, vision, life insurance
  • savings accounts
  • tuition reimbursement
  • paid volunteering
  • employer sponsored 401(k) plan
  • Sick leave – 56 hours
  • Observed Holidays – 11 days
  • Vacation – Flexible Time Off
  • Eligible for up to 10% Annual Performance Bonus
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Incident Response Analyst

Senior Cybersecurity Incident Response Analyst. This role has been designed as ‘...
Location
Location
Ireland , Galway
Salary
Salary:
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelors degree (or equivalent work experience) required, preferably in computer science, engineering or related area of study
  • Typically 4+ years of relevant experience
  • SOC team/Incident response analyst experience is required
  • Proven track record of leading complex cybersecurity initiatives and managing ambiguous incidents
  • Advanced understanding of adversary tactics, techniques, and procedures (TTPs)
  • Advanced Cyber and IT security knowledge
  • Advanced understanding of Cyber and IT security risks, best practices, threats and prevention measures as well as containment and remediation actions
  • Advanced understanding of SQL and relevant scripting languages
  • Advanced data security system analysis skills
  • Advanced risk assessment and management skills
Job Responsibility
Job Responsibility
  • Lead and coordinate responses to the most complex cybersecurity incidents, guiding cross-functional teams through containment, eradication, and recovery
  • Combines deep industry expertise with a thorough understanding of information and security technology to effectively analyze associated logs and respond to high severity incidents
  • Contributes to the company's security response methods, suggesting automation opportunities which can enhance IR
  • Mentor and provide technical guidance to less experienced cybersecurity professionals
  • Stay at the forefront of cybersecurity trends, threats, and technologies, driving innovation within the organization's threat detection and response capabilities
  • Foster a culture of continuous improvement and innovation, encouraging the adoption of new technologies and methodologies within the team
  • Providing insight and guidance through after action reviews working with stakeholders
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Fulltime
Read More
Arrow Right

Senior Managed Services Information Security Analyst

The Senior Managed Services Information Security Analyst is an advanced subject ...
Location
Location
Australia , Melbourne
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree or relevant qualification in Information Technology or Computing or a related field
  • Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar
  • Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous
  • Advanced experience in SOC Analysis Operations
  • Advanced experience in SIEM usage for investigations
  • Advanced experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy
  • Advanced experience in dealing with technical support to clients
  • Advanced experience in handling security incidents end to end
  • Advanced experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools
  • Advanced experience in Security Analysis or Engineering preferably gained within a global services organization
Job Responsibility
Job Responsibility
  • Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts
  • Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting
  • Monitors security tools to review and analyze security logs from client environments
  • Generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience
  • Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards
  • Utilizes and documents best practices and amend existing documentation as required
  • Identifies opportunities to make automations which will help the clients and security delivery teams
  • Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics
  • Utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure
  • Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as and when required
  • Fulltime
Read More
Arrow Right

Threat Intelligence Analyst

Threat Intelligence Analyst - initial 3-6 month contract. We're seeking a highly...
Location
Location
United Kingdom , Portsmouth or London
Salary
Salary:
Not provided
triarecruitment.com Logo
TRIA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years' experience in Threat Intelligence, SOC or Incident Response
  • Strong working knowledge of MITRE ATT&CK and threat actor lifecycle analysis
  • Hands-on experience with threat intelligence platforms such as MISP, Recorded Future, Anomali or similar
  • Strong experience with Microsoft security tooling, ideally Sentinel and Defender
  • Proficiency in KQL and working knowledge of Python for automation and enrichment
  • Experience integrating intelligence into SIEM, EDR/XDR, and cloud security platforms (Microsoft, AWS, CrowdStrike, etc.)
  • Deep understanding of the UK cyber threat landscape, particularly critical national infrastructure and public sector threats
  • Comfortable operating as a sole senior threat intelligence specialist while collaborating across SOC and InfoSec teams
Job Responsibility
Job Responsibility
  • Lead threat actor tracking and attribution, focusing on APTs, ransomware, supply chain attacks and UK-relevant campaigns
  • Maintain adversary profiles using MITRE ATT&CK, Diamond Model and sector-specific threat frameworks
  • Correlate internal security telemetry with external intelligence feeds (e.g. MISP, Recorded Future, ISACs, Microsoft TI)
  • Operationalise STIX/TAXII feeds and enrich IOC/IOA pipelines for SOC and Incident Response teams
  • Translate threat intelligence into actionable detections, working with engineers on KQL/SPL queries and proactive threat hunts
  • Produce regular threat reports and briefings for SOC leadership, CISO and senior stakeholders, including board-level risk narratives
  • Manage and oversee a third-party cyber threat intelligence provider, ensuring quality, relevance and value
  • Engage with UK threat-sharing communities and maintain internal threat intelligence documentation and playbooks
  • Fulltime
Read More
Arrow Right